Cyber risk and cybersecurity: a systematic review of data availability

被引:74
作者
Cremer, Frank [1 ]
Sheehan, Barry [1 ]
Fortmann, Michael [2 ]
Kia, Arash N. [1 ]
Mullins, Martin [1 ]
Murphy, Finbarr [1 ]
Materne, Stefan [2 ]
机构
[1] Univ Limerick, Limerick, Ireland
[2] TH Koln Univ Appl Sci, Cologne, Germany
关键词
Cyber insurance; Cyber risk; Open data; Systematic review; Cybersecurity; INTRUSION DETECTION SYSTEM; DEEP NEURAL-NETWORK; ATTACK DETECTION; DDOS ATTACKS; DATA BREACH; MALWARE DETECTION; FEATURE-SELECTION; HEALTH-CARE; FRAMEWORK; MACHINE;
D O I
10.1057/s41288-022-00266-6
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020, indicating an increase of more than 50% since 2018. With the average cyber insurance claim rising from USD 145,000 in 2019 to USD 359,000 in 2020, there is a growing necessity for better cyber information sources, standardised databases, mandatory reporting and public awareness. This research analyses the extant academic and industry literature on cybersecurity and cyber risk management with a particular focus on data availability. From a preliminary search resulting in 5219 cyber peer-reviewed studies, the application of the systematic methodology resulted in 79 unique datasets. We posit that the lack of available data on cyber risk poses a serious problem for stakeholders seeking to tackle this issue. In particular, we identify a lacuna in open databases that undermine collective endeavours to better manage this set of risks. The resulting data evaluation and categorisation will support cybersecurity researchers and the insurance industry in their efforts to comprehend, metricise and manage cyber risks.
引用
收藏
页码:698 / 736
页数:39
相关论文
共 230 条
[1]   Machine Learning Classification of Port Scanning and DDoS Attacks: A Comparative Analysis [J].
Aamir, Muhammad ;
Rizvi, Syed Sajjad Hussain ;
Hashmani, Manzoor Ahmed ;
Zubair, Muhammad ;
Ahmad, Jawwad .
MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2021, 40 (01) :215-229
[2]   DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation [J].
Aamir, Muhammad ;
Zaidi, Syed Mustafa Ali .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (06) :761-785
[3]   An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks [J].
Abu Al-Haija, Qasem ;
Zein-Sabatto, Saleh .
ELECTRONICS, 2020, 9 (12) :1-26
[4]   Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event and Intrusion Classification [J].
Adhikari, Ullain ;
Morris, Thomas H. ;
Pan, Shengyi .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (05) :4049-4060
[5]   Classification model for accuracy and intrusion detection using machine learning approach [J].
Agarwal, Arushi ;
Sharma, Purushottam ;
Alshehri, Mohammed ;
Mohamed, Ahmed A. ;
Alfarraj, Osama .
PEERJ COMPUTER SCIENCE, 2021,
[6]   A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate [J].
Agrafiotis, Ioannis ;
Nurse, Jason R. C. ;
Goldsmith, Michael ;
Creese, Sadie ;
Upton, David .
JOURNAL OF CYBERSECURITY, 2018, 4 (01)
[7]   ENSEMBLE TECHNIQUE FOR INTRUDER DETECTION IN NETWORK TRAFFIC [J].
Agrawal, Amar ;
Mohammed, Sabah ;
Fiaidhi, Jinan .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2019, 13 (03) :1-8
[8]   Towards Improving the Intrusion Detection through ELM (Extreme Learning Machine) [J].
Ahmad, Iftikhar ;
Alsemmeari, Rayan Atteah .
CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 65 (02) :1097-1111
[9]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[10]   Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection [J].
Al-Jarrah, Omar Y. ;
Alhussein, Omar ;
Yoo, Paul D. ;
Muhaidat, Sami ;
Taha, Kamal ;
Kim, Kwangjo .
IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (08) :1796-1806